Skip to main content

How to make sure no one is spying on your computer

[ad_1]


A program that spies on your computer activity is one of the most dangerous forms of malware. It won't present you with a ransomware request or announce it's deleting your files. Instead, it hides silently on your system, watching and recording all your computer activity.



Spyware can do everything from hijacking your webcam feed to recording your keyboard inputs. The culprits ultimately aim to collect enough of your personal data to steal your identity, take over your accounts, or expose your digital life in other ways. To minimize the odds of an unwanted program taking root on your machine, follow our guide to staying spyware-free.


Secure your system



To start with, you need to establish solid protection for your computer. Most antivirus programs for both Windows and macOS will protect against keyloggers, webcam hackers, and other types of spyware, especially if you vigilantly keep this software up to date.



How do you choose? You won't find a "one size fits all" security solution for everyone. For most home computers, free software should provide adequate level of protection, but paying for an upgraded version of the program will increase your chances of staying safe.



We chose four of the most effective and intuitive free antivirus tools we've used in recent years. They all receive high scores from AV-Comparatives, an organization that independently assesses antivirus software, even compared to excellent fee-based programs like Avira and McAfee. Although none of the following options specializes in fighting spyware, all of them include some defenses against that type of malicious program. As long as you install any one of these packages, you'll massively reduce your system's risk of infection.



Our picks are Windows Defender (included with Windows 10), AVG Free (for Windows and macOS, upgraded version costs $70/year), Bitdefender (for Windows, upgraded version includes macOS support and costs $54/year), Malwarebytes (for Windows, upgraded version includes macOS support and costs $40/year), and Avast (for Windows and macOS, upgraded version costs $60/year). If you upgrade these programs to paid-for versions, you'll gain extras like enhanced web-link scanning to catch dodgy URLs, more comprehensive options for proactively preventing attacks, and secure file storage.



Alongside your main security product, we recommend that you install secondary protection. For Windows, we like the free Spybot Search & Destroy, which works alongside your regular antivirus package, performing deep scans as an extra layer of defense against infectious code. If you suspect that your computer suffers from spyware, but your normal antivirus tool doesn't pick it up, try digging deeper into your system with the secondary Windows security program Norton Power Eraser. In a similar vein, Trend Micro's HouseCall serves as an extra scanner on top of your current security package, and it works from your web browser, which allows it to cover any type of operating system.


Avoid infection



Even with a strong antivirus program in place, you don't want to give spyware a chance to hitch a ride on your computer. If you want to keep prying eyes off your system, then you need to monitor all the potential ways malicious code can worm its way into your machine.



Sadly, some spyware enters through the household, when people attempt to pry into the computer behavior of their friends and family members. While we're sure everyone in your home is perfectly trustworthy...a shared computer should still have separate user accounts for each person who relies on that machine. Protect those accounts with passwords to keep out snoops: In Windows, do this in Settings > Accounts; in macOS, check the setting in System Preferences > Users & Groups.



Other programs arrive in disguise, purporting to be random web pop-ups or harmless email messages. They often hide within applications that look perfectly legit, or appear to be email attachments in a file format you recognize. Be wary of links you receive over social media or email, even if they appear to come from people you trust—a bad actor may have compromised their accounts or spoofed their identities. Here are a few ways to protect yourself from fraudulent links, which may contain spyware.



In addition, you need to be very careful about what you install on your computer, and where you download it from. If you want to try a new piece of software, make sure to read up on it first. And when you're ready to install the program, make sure you get it from the official website of the software company that designs it, or stick to programs that you can download from the Mac or Windows Store. The same goes for browser extensions. Giving these tools access to your browser can compromise its security, so you need to vet add-ons carefully. Before you install anything, check the reviews left by other users, or search for it to see if it has endorsements from professional tech sites.


Know the warning signs



No matter how tight you make your system's defenses, you shouldn't get complacent. In addition to taking the aforementioned precautions against infection, keep an eye out for these signs of spyware's presence.



One red flag is a system that runs sluggishly. Of course, older computers slow down gradually over time, but watch for a sudden drop in performance. Also keep an eye out for a lot of hard drive activity and software pauses, especially if they happen even when your computer is not running a lot of programs.



In general, you should treat strange and unexpected behavior—such as the launch of applications that you didn't open directly—with suspicion. This is no big deal if you've set programs to open automatically when the computer turns on, but it could be problematic if this happens when you're in the middle of a session. It's particularly suspect if windows appear briefly and then disappear again, a sign of a program loading and then hiding itself.



Every spyware program and system setup is different, so we can't really give you a definitive checklist; but the more suspicious occurrences you notice, the more likely it is that your computer has been infected. Other odd actions include unexplained mouse movements or text input, which might be a sign of something unknown working in the background; changes to the settings of the operating system; and the appearance of application shortcuts that you haven't noticed before.



Spyware will try to run invisibly, but it will still use up memory and CPU time. So you should check what programs and processes are running on your computer. On a Windows machine, you can use Task Manager, which you launch by searching for it in the taskbar box. Then switch to the Processes tab to see all the applications and processes currently in memory. On macOS, take advantage of a similar tool called Activity Monitor, which you can find by opening Spotlight (hit the Cmd+Space keyboard shortcut) and searching for Activity Monitor. Under the CPU tab you'll see a list of programs and processes currently running, as well as how much of your computer's system resources they're taking up.



What should you look for in Task Manager or Activity Monitor? Annoyingly, malicious tools frequently have names that look as innocuous as possible. This means we can't give you a definitive list of terms that indicate spyware. Instead, keep an eye out for applications or processes that you don't recognize or remember launching, then do a quick web search for their names to find out if they're legitimate or not.


The good news is that even as spyware becomes smarter and more sophisticated, browsers and operating systems are including more security tools. Still, you should always keep your system, its programs, and its security tools up to date with the latest patches.




[ad_2]

Written By David Nield

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ice for m

In the wake of NYC terrorist attack, Trump says he's ordered increased 'Extreme Vetting'

[ad_1] President Donald Trump has requested for a heightened vetting program following Tuesday's terrorist attack in New York. @realDonaldTrump: I have just ordered Homeland Security to step up our already Extreme Vetting Program. Being politically correct is fine, but not for this! Earlier, he tweeted that the attack in lower Manhattan was committed by a "sick and deranged person." @realDonaldTrump: In NYC, looks like another attack by a very sick and deranged person. Law enforcement is following this closely. NOT IN THE U.S.A.! His remarks came after a motorist drove onto a busy bicycle path near the World Trade Center memorial and struck several people on Tuesday, leaving at least eight people dead and a dozen injured. NBC News repor

How to save everything you post to social media

[ad_1] If you get the urge to revisit that cute photo you posted some time last year, you'll have to scroll through your timeline for what feels like hours to track it back down. Instead, when you share a post on social media, also save it to your phone for safe-keeping. This will not only save your social media hits for posterity, but also make them easier to find if you ever need to rediscover them. In this guide, we focus on saving photos and videos, because text posts are slightly more complicated—the only way to really preserve text from Facebook and Twitter is to download your entire archive (we'll explain how to do this below), and Instagram and Snapchat don't let you save or export your instant messages at all. When it comes to photos and videos, there's a shortcut to make sure they stay on your phone: Originally film them through a dedicated app, which will save them to a gallery. Only then should you open up a social media app to share them. However, there'